I noticed that the Traffic Graph shows all the traffic, its just the queue graph that gets clipped. Would this be affected by the traffic shaper max bandwidth values?
Same thing happened to me a couple of weeks ago. Just like NeophyteHeaven I had uninstalled Snort to upgrade to the new version. Only thing I could do was a clean install to get the WebConfigurator to run again.
You must involve some kind of encryption, ideally a VPN such as OpenVPN, IPsec, or as a last resort, PPTP.
HTTPS is ok, but a self-signed certificate has its drawbacks. If you always access it from the same machine though it isn't so bad, because you will still be notified if the certificate has changed in some way.
Personally, I use HTTPS+IP restrictions on most locations, and OpenVPN or other tunneling for the rest.
Ok, I'll assign a specifc high tun # and see if that changes anything. Perhaps this type of usage isn't really recommended?
It's more of a "it works if you're careful but don't expect perfection" type deal. :-)
Some other caveats are covered in the book and on the doc wiki, but mainly hardwiring the tun device is important if you have more than one OpenVPN instance – client or server.
If you change the LAN subnet, you have to change the DHCP server to assign the appropriate IPs and release and renew. Or if you're using a static IP on client, change the IP, gateway, and DNS.
jaime get your own thread. It is really rude to hijack someone else's topic.
madapaka,
open your config file in a text editor and see if there are any duplicate entries, maybe a section isn't closed properly or something got messed up.
Also can you confirm that everything was working fine on the new system with NO packages running?
Hi Tommy,
Except for the packages, yes everything is working (e.g. NAT, including the ipsec and openvpn tunnels), I also remember that I was in the same predicament before with version 1.2.2 but everything worked during reinstall; but everything went south with 1.2.3. reinstall.
I'm not sure how feasible this would be, but it may be possible with multiple instances of lighttpd. There is an HTTP->HTTPS redirect that happens on 2.0 now since HTTPS is the default.
This is how my rules look like.
The first rule is blocking all access to the firewall IP, but I can still access it from IP's that are not on the allowed list